Search results for "violations"
showing 10 items of 11 documents
European Union Protection of Human Rights through its global policy
2022
The Regime of Restrictive Measures against Serious Violations and Abuses of Human Rights launched at the end of 2020 by the European Union is part of the Commission's objective to reaffirm the Union's firm commitment to promoting universal values and strengthening its leadership in this field. However, the first year of implementation of the regime casts doubt on its effectiveness, given the existence of legal loopholes that tarnish it.
The European Court of Human Rights (ECtHR) vis-à-vis amnesties and pardons : factors concerning or affecting the degree of ECtHR’s deference to states
2022
States have adopted amnesties/pardons concerning serious human rights violations to transition from crises, dictatorships, or conflicts worldwide, including Europe. Although the ECtHR has yet to review amnesties/pardons directly, it has increasingly decided on the effects of amnesties/pardons on the rights of individuals. Thus, the main research question herein is to identify which factors may determine whether and to what extent the ECtHR defers to states regarding amnesties/pardons in cases of serious human rights violations, namely, factors concerning or affecting the degree of ECtHR’s deference to states in these cases. Based on ECtHR’s jurisprudence on amnesties/pardons, this article a…
Measurement of the jet fragmentation function and transverse profile in proton-proton collisions at a center-of-mass energy of 7 TeV with the ATLAS d…
2011
The jet fragmentation function and transverse profile for jets with 25 GeV<pT jet<500 GeV and |ηjet|<1.2 produced in proton–proton collisions with a center-of-mass energy of 7 TeV are presented. The measurement is performed using data with an integrated luminosity of 36 pb−1. Jets are reconstructed and their momentum measured using calorimetric information. The momenta of the charged particle constituents are measured using the tracking system. The distributions corrected for detector effects are compared with various Monte Carlo event generators and generator tunes. Several of these choices show good agreement with the measured fragmentation function. None of these choices reproduce both t…
Revisiting neutralization theory and its underlying assumptions to inspire future information security research
2022
Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance problem. Much of what we know about the theory focuses exclusively on the neutralization techniques identified in the original as well as subsequent criminological writings. What is often left unexamined in IS research is the underlying assumptions about the theory’s core elements; assumptions about the actor, the act, the normative system, and the nature of neutralizing itself. The objective of this commentary is to revisit the origin of neutrali…
Open dialogue as a human rights-aligned approach
2019
Throughout the last 20 years, the human rights perspective has increasingly developed into a paradigm against which to appraise and evaluate mental health care. This article investigates to what extent the Finnish open dialogue (OD) approach both aligns with human rights and may be qualified to strengthen compliance with human rights perspectives in global mental health care. Being a conceptual paper, the structural and therapeutic principles of OD are theoretically discussed against the background of human rights, as framed by the Universal Declaration of Human Rights, the UN Convention on the Rights of People with Disabilities, and the two recent annual reports of the Human Rights Council…
Voltage-Based Droop Control of Electric Vehicles in Distribution Grids under Different Charging Power Levels
2021
If left uncontrolled, electric vehicle charging poses severe challenges to distribution grid operation. Resulting issues are expected to be mitigated by charging control. In particular, voltage-based charging control, by relying only on the local measurements of voltage at the point of connection, provides an autonomous communication-free solution. The controller, attached to the charging equipment, compares the measured voltage to a reference voltage and adapts the charging power using a droop control characteristic. We present a systematic study of the voltage-based droop control method for electric vehicles to establish the usability of the method for all the currently available resident…
Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures
2020
A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company. peerReviewed
The taint of torture and the brazilian legal system
2019
In Brazil, the practice of torture intertwines deeply with its own history. The literature on the subject has had a greater intensification on its registers during the Dictatorial Regime (1964 to 1985). In spite of the Brazilian Constitution of 1988, Brazil only makes efforts to investigate the crimes of torture of this period to comply with the provisions of the United Nations in 2011. Within this scenario, the NationalTruth Commission (Law 12.528, of November 2011) was created with the purpose of clarifying the facts and circumstances of cases concerning human rights violations, as well as the Law on Access to Information (Law 12.527 of November 2011), which have regulated the constitutio…
Caur mobilo aplikāciju iegūtās informācijas izmantošana administratīvo pārkāpumu lietās
2017
Darba mērķis ir izpētīt caur mobilo aplikāciju iegūtas informācijas izmantošanu pierādīšanas procesā administratīvo pārkāpumu lietās un tādas informācijas attiecināmību, pieļaujamību un ticamību. Pētījuma rezultātā autors ir izdarījis secinājumus par pierādījumu jēdzienu, pierādījumu īpašībām un pētījuma ietvaros tiek secināts, ka, situācijā, ja lietā nav citu pierādījumu, kuri apstiprinātu pierādīšanas priekšmetā ietilpstošu faktu esamību, caur mobilo aplikāciju iegūtās informācijas ticamība ir apšaubāma. Lai šīs šaubas novērstu, nepieciešams iegūt papildus pierādījumus.
Culture and perceptions of power in teacher-student communication
2011
The objective of this study was to find out if national culture impacts the phenomenon of power as it is found in teacher-student communication at the University of Jyväskylä. The study is pertinent and relevant because of the increasingly rapid internationalization that is happening in the Finnish higher education system. Understanding aspects of intercultural teacher-student communication will be important for the future. A qualitative research process was chosen for this study and the data was collected by conducting in-depth interviews with 10 international students. They were asked about their experiences, perceptions and feelings while communicating with Finnish professors. Analysis a…